IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security are less explored. The IoT devices are light weight in nature and have low ...
Lightweight and privacy‐preserving authentication scheme with the resilience of desynchronisation attacks for WBANs
With the advances in wireless communication and Internet of things, wireless body area networks (WBANs) have attracted more and more attention because of the potential in improving the quality of health care services. With the help of WBANs, the user can ...
Privacy preservation with RTT‐based detection for wireless mesh networks
Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of services as compared to conventional networks. Due to the absence of centralised authority, WMNs suffers from both external and internal attacks, which decrease the ...
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process
In recent years, the security of online social networks (OSNs) has become an issue of widespread concern. Searching and detecting compromised accounts in OSNs is crucial for ensuring the security of OSN platforms. In this study, the authors proposed a new ...
Security analysis of KAP based on enhanced MPF
In the previous study, authors proved that inversion of enhanced matrix power function (MPF), introduced as conjectured one‐way function, is a nondeterministic polynomial time (NP)‐complete problem. Furthermore, a key agreement protocol (KAP), the ...
Malware classification using compact image features and multiclass support vector machines
Malware and malicious code do not only incur considerable costs and losses but impact negatively the reputation of the targeted organisations. Malware developers, hackers, and information security specialists are continuously improving their strategies to ...
Algebraic method to recover superpolies in cube attacks
Cube attacks are an important type of key recovery attacks against nonlinear feedback shift register (NFSR)‐based cryptosystems. The key step in cube attacks closely related to key recovery is recovering superpolies. However, in the previous cube attacks ...
Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme
The identity‐based signature (IBS) scheme is one of the most promising secure and widely used cryptographic primitives for electronic commerce applications. For example, ID‐based signing in a multi‐party setting, without ever revealing any private and ...
Novel LDoS attack detection by Spark‐assisted correlation analysis approach in wireless sensor network
Low‐rate denial of service (LDoS) attack is a special DoS attack type of wireless sensor network (WSN). Routing protocol is the critical component of the WSN. Routing flood attack is a novel LDoS attack pattern in WSN. However, the attack is difficult to ...
Scan‐based attack tolerance with minimum testability loss: a gate‐level approach
Scan chain is an architectural solution to facilitate in‐field tests and debugging of digital chips, however, it is also known as a source of security problems, e.g. scan‐based attacks in the chips. The authors conduct a comprehensive gate‐level security ...
Cloud‐assisted secure and conjunctive publish/subscribe service in smart grids
The publish/subscribe (P/S) service on Advanced Metering Infrastructure (AMI) servers of smart grid need to deal with huge amount of data, which may lead to data burst on AMI servers and serious server crash. Moreover, for protecting data security, ...